• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

26127 TEC courses in Cardiff delivered Online

BA27 - Writing and Managing Effective Requirements

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for intermediate to advanced Business Analysts who are looking to improve their skills for eliciting, analyzing, documenting, validating, and communicating requirements. Overview Obtain a thorough understanding of the core responsibilities of the business analyst Understand the main professional associations and standards supporting business analysts in the industry Discuss and explore the components of each of the domains/knowledge areas that comprise the work of business analysis Recognize the importance of properly defining the business need prior to engaging in requirements activities Formulate a strong understanding of the concepts that comprise strategy analysis Obtain experience with identifying and analyzing stakeholders Decipher between project and product scope and successfully use models to communicate scope Thoroughly understand and identify the various requirements categories and be able to recognize requirements of various types Explore business rules analysis Understand the benefits of process modeling and the common modeling language of BPMN Discuss process models and how the techniques can capture details about the as-is/to-be environment Learn how to properly prepare and conduct interviews Explore the components of use cases Learn what it means to package requirements Obtain hands-on experience with a number of business analysis techniques and gain hands-on experience eliciting, defining, and writing requirements. This course provides students a clear understanding of all the facets of the business analysis role, including a thorough walkthrough of the various domain/knowledge areas that comprise the business analysis profession. Students are provided an opportunity to try their hand at several business analysis techniques to assist with improving their skills in stakeholder identification, scope definition, and analyzing, documenting, and modeling requirements. Introduction to Business Analysis What is business analysis Benefits and challenges of business analysis Project success factors A Closer Look at the Business Analyst Role Definition of a business analyst Responsibilities of a business analyst Importance of communication/collaboration BA role vs. PM role Project roles involved in requirements IIBA/PMI and the goals of a professional association Purpose for having a BA standard IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Business analysis beyond project work Business analysis core concepts Business analysis perspectives IIBA and PMI certifications for business analysts Workshop: Choose Your Project Supporting the Project Portfolio (Enterprise Analysis) Define Strategy Analysis When to perform Strategy Analysis Components of Strategy Analysis Defining the business need Envisioning the Product and Project Defining business requirements The importance of stakeholders Stakeholder identification Tips for analyzing stakeholders Techniques for managing stakeholder lists Discussion: Who is involved in strategy analysis? Workshops: Define the Business Need, Write Business Requirements, and Identify Stakeholders Understanding and Defining Solution Scope Defining solution scope Techniques for defining solution scope Applying the brainstorming technique Project scope vs. Product scope Finding solution boundaries The Context Diagram Actors and key information Workshop: Draw a Context Diagram Understanding Requirements What is a requirement? Requirement types Business, Stakeholder, Solution, and Transition requirements Assumptions and constraints Business rules Taxonomy of business rules Decision tables How to write simple calculations Requirements vs. business rules Document requirements Workshop ? Document Requirements Elicitation and Process Modeling Why do we model processes? What is Business Process Management? Using a modeling notation ?As Is? vs. ?To Be? modeling Why use BPMN? Basic BPM notation Business Process Modeling ? A case study Business Process Realignment ?As Is? vs. ?To Be? activity diagrams Workshop: Create a Business Process Model Planning & Eliciting Requirements Interviewing ? what and why? Preparing for an effective interview Types of questions to ask Sequencing questions Active listening techniques Planning for elicitation Conducting the interview Establishing rapport Active Listening Feedback techniques Types of elicitation techniques Workshops: Planning for Elicitation and Conducting an Elicitation Session Use Case & User Story Analysis What is an Actor? Types of Actors How to ?find? Use Cases? Diagramming Use Cases Tips on naming Use Cases Explaining scenarios The use case template Components of a use case Scenario examples Best practices for writing Use Cases Scenarios and flows Alternate and exception flows Exercises: Drawing a Use Case Diagram, Writing the Main Success Scenario, and Writing Alternate and Exception Scenarios Analyzing & Documenting Requirements Requirements and Use Cases Non-Functional requirements User Interface Requirements UI Data Table Reporting requirements Data requirements Data accessibility requirements Characteristics of good requirements The business requirements document (BRD) BRD vs. Functional Requirements Specification Preparing the requirements package Requirements traceability Workshops: Develop a User Interface, Analyzing Requirements, and Tracing requirements Additional Resources Useful books and links on writing effective requirements

BA27 - Writing and Managing Effective Requirements
Delivered OnlineFlexible Dates
Price on Enquiry

Mastering Scala with Apache Spark for the Modern Data Enterprise (TTSK7520)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This intermediate and beyond level course is geared for experienced technical professionals in various roles, such as developers, data analysts, data engineers, software engineers, and machine learning engineers who want to leverage Scala and Spark to tackle complex data challenges and develop scalable, high-performance applications across diverse domains. Practical programming experience is required to participate in the hands-on labs. Overview Working in a hands-on learning environment led by our expert instructor you'll: Develop a basic understanding of Scala and Apache Spark fundamentals, enabling you to confidently create scalable and high-performance applications. Learn how to process large datasets efficiently, helping you handle complex data challenges and make data-driven decisions. Gain hands-on experience with real-time data streaming, allowing you to manage and analyze data as it flows into your applications. Acquire practical knowledge of machine learning algorithms using Spark MLlib, empowering you to create intelligent applications and uncover hidden insights. Master graph processing with GraphX, enabling you to analyze and visualize complex relationships in your data. Discover generative AI technologies using GPT with Spark and Scala, opening up new possibilities for automating content generation and enhancing data analysis. Embark on a journey to master the world of big data with our immersive course on Scala and Spark! Mastering Scala with Apache Spark for the Modern Data Enterprise is a five day hands on course designed to provide you with the essential skills and tools to tackle complex data projects using Scala programming language and Apache Spark, a high-performance data processing engine. Mastering these technologies will enable you to perform a wide range of tasks, from data wrangling and analytics to machine learning and artificial intelligence, across various industries and applications.Guided by our expert instructor, you?ll explore the fundamentals of Scala programming and Apache Spark while gaining valuable hands-on experience with Spark programming, RDDs, DataFrames, Spark SQL, and data sources. You?ll also explore Spark Streaming, performance optimization techniques, and the integration of popular external libraries, tools, and cloud platforms like AWS, Azure, and GCP. Machine learning enthusiasts will delve into Spark MLlib, covering basics of machine learning algorithms, data preparation, feature extraction, and various techniques such as regression, classification, clustering, and recommendation systems. Introduction to Scala Brief history and motivation Differences between Scala and Java Basic Scala syntax and constructs Scala's functional programming features Introduction to Apache Spark Overview and history Spark components and architecture Spark ecosystem Comparing Spark with other big data frameworks Basics of Spark Programming SparkContext and SparkSession Resilient Distributed Datasets (RDDs) Transformations and Actions Working with DataFrames Spark SQL and Data Sources Spark SQL library and its advantages Structured and semi-structured data sources Reading and writing data in various formats (CSV, JSON, Parquet, Avro, etc.) Data manipulation using SQL queries Basic RDD Operations Creating and manipulating RDDs Common transformations and actions on RDDs Working with key-value data Basic DataFrame and Dataset Operations Creating and manipulating DataFrames and Datasets Column operations and functions Filtering, sorting, and aggregating data Introduction to Spark Streaming Overview of Spark Streaming Discretized Stream (DStream) operations Windowed operations and stateful processing Performance Optimization Basics Best practices for efficient Spark code Broadcast variables and accumulators Monitoring Spark applications Integrating External Libraries and Tools, Spark Streaming Using popular external libraries, such as Hadoop and HBase Integrating with cloud platforms: AWS, Azure, GCP Connecting to data storage systems: HDFS, S3, Cassandra, etc. Introduction to Machine Learning Basics Overview of machine learning Supervised and unsupervised learning Common algorithms and use cases Introduction to Spark MLlib Overview of Spark MLlib MLlib's algorithms and utilities Data preparation and feature extraction Linear Regression and Classification Linear regression algorithm Logistic regression for classification Model evaluation and performance metrics Clustering Algorithms Overview of clustering algorithms K-means clustering Model evaluation and performance metrics Collaborative Filtering and Recommendation Systems Overview of recommendation systems Collaborative filtering techniques Implementing recommendations with Spark MLlib Introduction to Graph Processing Overview of graph processing Use cases and applications of graph processing Graph representations and operations Introduction to Spark GraphX Overview of GraphX Creating and transforming graphs Graph algorithms in GraphX Big Data Innovation! Using GPT and Generative AI Technologies with Spark and Scala Overview of generative AI technologies Integrating GPT with Spark and Scala Practical applications and use cases Bonus Topics / Time Permitting Introduction to Spark NLP Overview of Spark NLP Preprocessing text data Text classification and sentiment analysis Putting It All Together Work on a capstone project that integrates multiple aspects of the course, including data processing, machine learning, graph processing, and generative AI technologies.

Mastering Scala with Apache Spark for the Modern Data Enterprise (TTSK7520)
Delivered OnlineFlexible Dates
Price on Enquiry

BA03 - Writing Effective Business Cases

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for intermediate business and requirements analysts who are looking to improve their business case development and presentation skills. This course is also a great fit for project managers and product owners who work closely with business analysts or who perform some form of business case work themselves. Overview Understand the role of the business analyst within the business case process Understand the main professional associations and standards that support business analysts in the industry Discuss the benefits of business case creation Explore how to define the business need Describe the role of the business analyst in supporting the enterprise to determine how to optimally invest in the right project initiatives Explain how to identify stakeholders and the significance to the pre-project activities Discuss the importance of analyzing the enterprise Describe and explore the activities performed to assess the current business environment Explain how a business analyst describes a ?future? state environment including how to identify gaps in enterprise capabilities Present and explore how to define the scope of a solution Describe the activities performed and techniques used to determine viable solution options Explore various techniques for evaluating solution options including feasibility and risk analysis Thoroughly understand the purpose of conducting a feasibility assessment Discuss and practice a number of business analysis techniques that support the business case process Explore the components of a business case Describe how the business case supports decision makers in making go/no-go decisions Demonstrate how to assemble the output from pre-project activities into a well-structured business case Present techniques for presenting business cases to top level managers and obtaining buy-in Discuss methods for preparing for challenges during business case delivery Students learn the steps to effective business case development and support your strategic business recommendations with sound budgeting and financial back-up. The one course you need to make high-impact recommendations and receive full management support for your ideas. Introduction Module Learning Objectives What is Business Analysis Polling Question International Institute of Business Analysis BABOK© Guide Components Project Management Institute Business Analysis for Practitioners: A Practice Guide BABOK© Guide Knowledge Areas Benefits of Business Analysis Polling Question A Business Analyst can Influence Project Success Factors Challenges of Business Analysis Polling Question Purpose of a Business Case Exercise 1a: What Should a Business Case Include Define the Business Case Elements What to Look Out For Who is Involved Exercise 1b: Review Business Case Outline Module Learning Objectives Pre-Project Activities & the Business Analyst Module Learning Objectives The Definition of a Business Analyst The Role of a Business Analyst Responsibilities of a BA BA Role vs. PM Role Business Analysis vs. Systems Analysis Business Analysis Competencies Polling Question Business Analyst Role and Stakeholders Exercise 2a: Review the Case Study What is a Stakeholder? The Importance of Stakeholders Stakeholder Identification Tips for Identifying Stakeholders Other Stakeholder Tips Stakeholder Identification/Analysis Exercise 2b: Identify Roles and Responsibilities Stakeholder Map Stakeholder Matrix & Onion Diagrams A Stakeholder Map Onion Diagram Exercise 2c: Why do we Need to Understand the Enterprise? Why Study the Enterprise? What is Enterprise Architecture? What is Strategy Analysis? About Strategy Analysis Purpose of Strategy Analysis When to Perform Strategy Analysis Strategic Planning Module Summary The Needs Assessment Process Module Learning Objectives Business Need Defined Define Business Need The Needs Assessment Process Problem or Opportunity Exercise 3a: Problem/Opportunity Identification Understanding Why Situation Statements Business Need and Current State Determine the Stakeholders Polling Question Goals and Objectives Polling Question Exercise 3b: Give 3 Examples of Business Goals Define Business Need Techniques Exercise 3c: Identify the Business Need Definition of Strategy Analysis When Business Strategy is not Driving Project Definition Typical Project Profile The Executive Paradox Solution to the Paradox Exercise 3d: Describe 3 Outcomes You Would Expect from the Case Study The Four ?Ares? Understand How to Create a Business Model Business Model Example Exercise 3e: Create a Business Model The Business Case Approach Financial and Strategic Measurement Tools Module Summary Determining the Required Capabilities & Defining Solution Scope Module Learning Objectives Business Need and Current State Purpose of Analyzing the Current State Analyzing Current Capabilities and Process Capabilities Defined Techniques for Analyzing the Current State Define the Future State Techniques for Defining the Future State Assess Capability Gaps Stakeholders Involved when Reviewing Capability Gaps Discussion: Assessing New Capabilities Defining Solution Scope Determining Scope Boundary How to Define Solution Scope Defining Solution Scope Project Scope and Product Scope Scope Modeling Techniques Used to Define Scope Define Scope Boundaries Modeling Scope: Context Diagram Exercise 4a: Create a Context Diagram from the Case Study Communicating Solution Scope to Stakeholders Stakeholders Participating in Scope Activities Exercise 4b: Discuss Managing Expectations Module Summary Assessing Feasibility & Proposing Solution Options Module Learning Objectives Financial Analysis Purpose of Financial Analysis Costs versus Benefits Financial Models Timing for Assessing Financial Benefits Risk Assessing Risks Risk Process Exercise 5a: Identifying Risks Risk Analysis Capturing and Categorizing Risks Risk Strategies Tolerance for Risk Determining Solution Options Solution Option Process Determining and Analyzing Solution Options Brainstorming Conducting an Outcomes Focused Brainstorming Session Stakeholders Involved in Determining Solution Options Exercise 5b: Determining Solution Options Feasibility Analysis Discussion: Ranking Solution Options Discussion: Recommending the Most Viable Option Exercise 5c: Assess the Most Viable Options Solution Approach Definition Exercise 5d: Review the Business Case Templates Module Summary Packaging & Presenting the Business Case Module Learning Objectives Circumventing a Business Case Documenting the Business Case Value of the Business Case Process Business Case Components Business Case Techniques Build a Convincing Business Case Discussion: Identifying Decision Criteria Exercise 6a: Supporting a Go/No Go Decision Packaging the Business Case Planning Business Case Delivery Discussion: Planning Stakeholder Buy-in Information and Communication Needs in the Business Case Process Presenting your Business Case Exercise 6b: Anticipating and Responding to Challenges Module Summary Course Wrap Up Course Summary Questions Additional Resources Thank You Additional course details: Nexus Humans BA03 - Writing Effective Business Cases training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA03 - Writing Effective Business Cases course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA03 - Writing Effective Business Cases
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Digital Learning Security

By Nexus Human

Duration 69 Days 414 CPD hours Cisco Learning Library: Security offers a subscription to all Cisco online cybersecurity and cyber operations training, including extensive sk This comprehensive technical training library offers full-length, interactive certification courses, product and technology training with labs, and thousands of reference materials. Security Library Certification Courses CCNP Security Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS) v4.0 Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 Securing Email with Cisco Email Security Appliance (SESA) v3.0 Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 Implementing Automation for Cisco Security Solutions (SAUI) v1.0 CCIE Security Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 Product and Technology Training Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 Implementing Automation for Cisco Security Solutions (SAUI) v1.0 Understanding Cisco Cybersecurity Fundamentals (SECFND) v1.0 Implementing Cisco Cybersecurity Operations (SECOPS) v1.0 Implementing Secure Solutions with Virtual Private Networks (SVPN) v1.0 Implementing an Integrated Threat Defense Solution (SECUR201) v1.0 Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRules) v2.0 Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 Securing Networks with Cisco Firepower Next Generation Firewall (SSNGFW) v1.0 Securing Email with Cisco Email Security Appliance (SESA) v3.0 Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 Securing Networks with Cisco Firepower Next-Generation IPS (SSFIPS) v4.0 Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v2.0 Securing Industrial IoT Networks with Cisco Technologies (ISECIN) v1.0 Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP) v5.0 Introducing Cisco Cloud Consumer Security (SECICC) v1.0 Securing Cloud Deployments with Cisco Technologies (SECCLD) v1.0 Configuring Cisco ISE Essentials for SD-Access (ISESDA) v1.0 Securing Branch Internet and Cloud Access with Cisco SD-WAN (A-SDW-BRSEC)

Cisco Digital Learning Security
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco Service Provider Network Foundations v1.0 (SPFNDU)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for network and software engineers and hold job roles such as: Network administrator Network engineer Network manager System engineer Project manager Network designer Overview After taking this course, you should be able to: Describe network architectures, devices, and software used by service providers Describe the various Internet governance organizations, their roles, and tools available for governance information verification Configure Cisco Internetwork Operating System (Cisco IOS) and Cisco IOS XE routers Describe Cisco IOS XR software, perform initial configuration, and explain platform daily tasks Describe various access and core technologies used by service providers Describe various major switching technologies used by service providers Describe major overlay technologies and their usage, and configure Virtual Extensible LAN I (VxLAN) Describe various major routing protocols used by service providers Configure Layer 3 services used by service providers Describe Multiprotocol Label Switching (MPLS), components, protocols, and MPLS usage Describe usage of various services used and maintained by service providers Introduce Linux networking, Bourne Again Shell (BASH) scripting, and their usage within Cisco IOS XR software This course is designed to provide you with the foundational knowledge for the suite of Cisco© CCNP© Service Provider courses. The course expands what you learned from the Cisco CCNA© course with a focus on theoretical and practical knowledge needed for the Service Provider environment. Through a combination of lessons and hands-on practice, you will learn about architectures, protocols, software and hardware platforms, and solutions within the Service Provider realm. While this course does not lead directly to a certification exam, it does cover foundational knowledge critical to the success in the Service Provider Technology track. Course Outline Introducing Service Provider Architectures Describing Internet Governance Organizations Configuring the Cisco IOS and Cisco IOS XE Router Configuring Cisco IOS XR Router Introducing Access and Core Technologies in the Service Provider Environment Introducing Routing Technologies in the Service Provider Environment Describing MPLS Implementing Layer 3 Services Introducing Switching Technologies in the Service Provider Environment Introducing Overlay Technologies Implementing Service Provider Services Introducing Programmability on Cisco IOS XR Routers Lab outline Review Lab Environment Examine Governance Data Perform an Initial Cisco Internetworking Operating System (IOS XE) Configuration Configure Connectivity and Connectivity Verification on Cisco IOS XE Devices Perform Initial Cisco IOS XR Configuration Configure and Verify Connectivity on Cisco IOS XR Configure Intermediate System to Intermediate System (IS-IS) Configure Routing Information Protocol (RIPv2) and RIP extension (RIPng) Configure Basic Border Gateway Protocol (BGP) Configure MPLS Configure Internet Protocol Service Level Agreement (IP SLA) Configure Hot Standby Router Protocol (HSRP) with Object Tracking Configure Virtual Routing and Forwarding (VRFs) Configure Network Time Protocol (NTP) Use Linux Command Line Interface Configure IOS XR Using a Bash Script

Cisco Understanding Cisco Service Provider Network Foundations v1.0 (SPFNDU)
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Database 12c R2 - Backup and Recovery Workshop Ed 3

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Support Engineer Technical Administrator Technical Consultant Overview Use Oracle Flashback Technologies to recover from human error Use Recovery Manager (RMAN) to create backups and perform recovery operations Use the Data Recovery Advisor to diagnose and repair failures Plan effective backup and recovery procedures Describe the Oracle Database architecture components related to backup and recovery operations Perform an encrypted database backup and restore Perform tablespace point-in-time recovery Configure the database for recoverability Describe Cloud Tooling for Backup and Recovery Describe Oracle Database backup methods and recovery operations that can be used to resolve database failure In this Oracle Database 12c R2: Backup and Recovery Workshop, students learn how to perform backup and recovery based on the related Oracle Database architecture components. Various backup, failure, restore, and recovery scenarios are provided so that students learn to evaluate their own recovery requirements and develop an appropriate strategy for backup and recovery procedures. This course includes an interactive workshop, with scenarios that provide participants with opportunities to diagnose and recover from several failure situations. Introduction Curriculum Context Assess your recovery requirements Categories of failures Oracle backup and recovery solutions Oracle Maximum Availability Architecture Oracle Secure Backup Benefits of using Oracle Data Guard Basic Workshop Architecture Getting Started Core Concepts of the Oracle Database, critical for Backup and Recovery Oracle DBA Tools for Backup and Recovery Connecting to Oracle Recovery Manager (RMAN) Configuring for Recoverablility RMAN commands Configuring and managing persistent settings Using the Fast Recovery Area (FRA) Control File Redo Log File Archiving Logs Using the RMAN Recovery Catalog Creating and Configuring the Recovery Catalog Managing Target Database Records in the Recovery Catalog Using RMAN Stored Scripts Maintaining and Protecting the Recovery Catalog Virtual Private Catalogs Backup Strategies and Terminology Backup Solutions Overview and Terminology Balancing Backup and Restore Requirements Backing Up Read-Only Tablespaces Data Warehouse Backup and Recovery: Best Practices Additional Backup Terminology Performing Backups RMAN Backup Types Incrementally Updated Backups Fast Incremental Backup Block Change Tracking Oracle-Suggested Backup Reporting on Backups Managing Backups Improving Your Backups Compressing Backups Using a Media Manager Backup and Restore for Very Large Files Creating RMAN Multi-section Backups, Proxy Copies, Duplexed Backup Sets and Backups of Backup Sets Creating and Managing Archival Backups Backing Up Recovery Files Backing Up the Control File to a Trace File Cataloging Additional Backup Files Using RMAN-Encrypted Backups Creating RMAN-Encrypted Backups Using Transparent-Mode Encryption Using Password-Mode Encryption Using Dual-Mode Encryption Diagnosing Failures Reducing Problem Diagnosis Time Automatic Diagnostic Repository Data Recovery Advisor Handling Block Corruption Restore and Recovery Concepts Restoring and Recovering Instance Failure and Instance/Crash Recovery Media Failure Complete Recovery (Overview) Point-in-Time Recovery (Overview) Recovery with the RESETLOGS Option Performing Recovery, Part I RMAN Recovery in NOARCHIVELOG Mode Performing Complete Recovery (of critical and noncritical data files) Restoring ASM Disk Groups Recovery with Image Files Performing Point-in-Time (PITR) or Incomplete Recovery Performing Recovery, Part II Recovery of Server Parameter File, Control File (One and All) Redo Log File Loss and Recovery Password Authentication File Re-creation Index, Read-Only Tablespace, and Temp file Recovery Restoring the Database to a New Host Disaster Recovery Restoring RMAN Encrypted Backups RMAN and Oracle Secure Backup Oracle Secure Backup Overview and Interface Options RMAN and OSB: Overview and Basic Process Flow Starting with Oracle Secure Backup Configuring Oracle Secure Backup for RMAN RMAN Backup and Restore Operations Oracle Secure Backup Jobs Displaying OSB log files and transcripts for RMAN activities Using Flashback Technologies Flashback Technology: Overview and Setup Using Flashback Technology to Query Data Flashback Table Flashback Transaction (Query and Back out) Flashback Drop and the Recycle Bin Flashback Data Archive Using Flashback Database Flashback Database Architecture Configuring Flashback Database Performing Flashback Database Best Practices for Flashback Database Transporting Data Transporting Data Across Platforms Transporting Data with Backup Sets Database Transport: Using Data Files Performing Point-in-Time Recovery When to use TSPITR TSPITR Architecture Performing RMAN TS Point-in-time Recovery Recovering Tables from Backups Duplicating a Database Using a Duplicate Database Duplicating Database with 'push' and 'pull' techniques Choosing Database Duplication Techniques Creating a Backup-up Based Duplicate Database Understanding the RMAN Duplication Operation RMAN Troubleshooting and Tuning Interpreting RMAN Message Output Tuning Principles Diagnosing Performance Bottlenecks RMAN Multiplexing Restore and Recovery Performance Best Practices Cloud Tooling for Backup and Recovery Backup Destinations Customize Backup Configuration On-Demand Backup and Recovery Oracle Backup Cloud Service Installing the Backup Module Backup and Recovery Workshop Workshop Structure and Approach Business Requirements for Database Availability and Procedures Diagnosing the Failures

Oracle Database 12c R2 - Backup and Recovery Workshop Ed 3
Delivered OnlineFlexible Dates
Price on Enquiry

QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for a non-technical audience and doesn't require any prior coding or technical experience. The handson exercises will be done using pre-built OpenAI tools and interfaces that are user-friendly and easy to use. Overview Working in an interactive learning environment, led by our engaging expert, you will: Get comfortable with the basics of prompt engineering and discover how it can make a difference in various business tasks, such as enhancing customer support, creating content, and fine-tuning sales pitches. Develop the knack for crafting, refining, and perfecting prompts suited to specific business situations by understanding context, user intent, and what makes a prompt great. Learn how to smoothly incorporate prompt engineering solutions into your existing business workflows, including pinpointing the right processes, integrating with your current software, and keeping data privacy and security in check. Become proficient in advanced techniques and best practices in prompt engineering, like making use of APIs, customizing language models, and collaborating with your teammates across different departments. Keep up with the latest developments in prompt engineering and be ready to adapt to changing business needs and trends, ensuring that you stay relevant and continue to grow in the dynamic business world. Prompt engineering is the process of designing and refining input prompts to get desired output from advanced language models, such as OpenAI Codex or GPT-4. It involves creating effective questions or statements that guide the AI model to generate useful responses for a specific task or purpose, like enhancing customer support, generating content, and fine-tuning sales pitches, making it an essential skill set for a wide range of business applications. Quick Start to Prompt Engineering for Everyday Business Users is a one-day, workshop style hands-on course that where you'll learn how to create effective prompts, integrate prompt engineering solutions into existing workflows, and uncover advanced techniques and best practices. Guided by our engaging, expert instructor, you?ll experiment with innovative tools and develop practical skills that can be immediately applied to a variety of projects. Whether you're aiming to enhance customer interactions, simplify content creation, or refine internal communication, this immersive learning experience will equip you with the knowledge to make a meaningful impact on your organization. Introduction to Prompt Engineering Understand the fundamentals of prompt engineering and its applications in the business world. What is prompt engineering? Importance of prompt engineering in business Key concepts and terminology Examples of prompt engineering in business scenarios Overview of popular prompt engineering tools (e.g., OpenAI Codex, GPT-4) Activity: Hands-on exploration of prompt engineering tools: Participants will engage in a fun scavenger hunt activity, where they will experiment with different prompt engineering tools to answer a set of questions. Developing Effective Prompts Learn how to create and refine prompts for a variety of business applications. Anatomy of a good prompt Understanding context and user intent Techniques for prompt iteration and optimization Generating specific and creative responses Handling sensitive information and biases Activity: Prompt development workshop: Participants will practice developing and refining prompts in a collaborative, game-like environment, where they will compete to create the most effective prompts for given business scenarios. Integrating Prompt Engineering into Business Processes Discover how to incorporate prompt engineering solutions into existing workflows. Identifying business processes that can benefit from prompt engineering Integrating prompt engineering with existing software and tools Evaluating the success and impact of prompt engineering solutions Ensuring data privacy and security Scaling prompt engineering solutions across an organization Activity: Business process integration simulation: Participants will work in teams to create a plan for integrating a prompt engineering solution into a simulated business process, with a focus on creativity and practicality. Advanced Techniques and Best Practices Gain insights into advanced techniques and best practices for prompt engineering in a business context. Leveraging APIs for prompt engineering Customizing and fine-tuning language models Adapting to changing business requirements and trends Collaborating with cross-functional teams Staying up-to-date with prompt engineering advancements Activity: Advanced prompt engineering challenge: Participants will take part in a friendly competition, using advanced techniques to solve complex business-related prompt engineering challenges. Additional course details: Nexus Humans QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

QuickStart to Prompt Engineering for Everyday Business Users  (TTAI2009)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals with five to eight years of experience in these roles: Data center engineers Network designers Network administrators Network engineers Systems engineers System administrator Consulting systems engineers Technical solutions architects Server administrators Network managers Cisco integrators or partners Overview After taking this course, you should be able to: Describe the Layer 2 and Layer 3 forwarding options and protocols used in a data center Describe the rack design options, traffic patterns, and data center switching layer access, aggregation, and core Describe the Cisco Overlay Transport Virtualization (OTV) technology that is used to interconnect data centers Describe Locator/ID separation protocol Design a solution that uses Virtual Extensible LAN (VXLAN) for traffic forwarding Describe hardware redundancy options; how to virtualize the network, compute, and storage functions; and virtual networking in the data center Describe solutions that use fabric extenders and compare Cisco Adapter Fabric Extender (FEX) with single root input/output virtualization (SR-IOV) Describe security threats and solutions in the data center Describe advanced data center security technologies and best practices Describe device management and orchestration in the data center Describe the storage options for compute function and different Redundant Array of Independent Disks (RAID) levels from a high-availability and performance perspective Describe Fibre Channel concepts, topologies, architecture, and industry terms Describe Fibre Channel over Ethernet (FCoE) Describe security options in the storage network Describe management and automation options for storage networking infrastructure Describe Cisco UCS servers and use cases for various Cisco UCS platforms Explain the connectivity options for fabric interconnects for southbound and northbound connections Describe the hyperconverged solution and integrated systems Describe the systemwide parameters for setting up a Cisco UCS domain Describe role-based access control (RBAC) and integration with directory servers to control access rights on Cisco UCS Manager Describe the pools that may be used in service profiles or service profile templates on Cisco UCS Manager Describe the different policies in the service profile Describe the Ethernet and Fibre Channel interface policies and additional network technologies Describe the advantages of templates and the difference between initial and updated templates Describe data center automation tools The Designing Cisco Data Center Infrastructure (DCID) v7.0 course helps you master design and deployment options focused on Cisco© data center solutions and technologies across network, compute, virtualization, storage area networks, automation, and security. You will learn design practices for the Cisco Unified Computing System? (Cisco UCS©) solution based on Cisco UCS B-Series and C-Series servers, Cisco UCS Manager, and Cisco Unified Fabric. You will also gain design experience with network management technologies including Cisco UCS Manager, Cisco Data Center Network Manager (DCNM), and Cisco UCS Director. This course helps you prepare to take the exam, Designing Cisco Data Center Infrastructure (300-610 DCID) Describing High Availability on Layer 2 Overview of Layer 2 High-Availability Mechanisms Virtual Port Channels Cisco Fabric Path Virtual Port Channel+ Designing Layer 3 Connectivity First Hop Redundancy Protocols Improve Routing Protocol Performance and Security Enhance Layer 3 Scalability and Robustness Designing Data Center Topologies Data Center Traffic Flows Cabling Challenges Access Layer Aggregation Layer Core Layer Spine-and-Leaf Topology Redundancy Options Designing Data Center Interconnects with Cisco OTV Cisco OTV Overview Cisco OTV Control and Data Planes Failure Isolation Cisco OTV Features Optimize Cisco OTV Evaluate Cisco OTV Describing Locator/ID Separation Protocol Locator/ID Separation Protocol Location Identifier Separation Protocol (LISP) Virtual Machine (VM) Mobility LISP Extended Subnet Mode (ESM) Multihop Mobility LISP VPN Virtualization Describing VXLAN Overlay Networks Describe VXLAN Benefits over VLAN Layer 2 and Layer 3 VXLAN Overlay Multiprotocol Border Gateway Protocol (MP-BGP) Ethernet VPN (EVPN) Control Plane Overview VXLAN Data Plane Describing Hardware and Device Virtualization Hardware-Based High Availability Device Virtualization Cisco UCS Hardware Virtualization Server Virtualization SAN Virtualization N-Port ID Virtualization Describing Cisco FEX Options Cisco Adapter FEX Access Layer with Cisco FEX Cisco FEX Topologies Virtualization-Aware Networking Single Root I/O Virtualization Cisco FEX Evaluation Describing Basic Data Center Security Threat Mitigation Attack and Countermeasure Examples Secure the Management Plane Protect the Control Plane RBAC and Authentication, Authorization, and Accounting (AAA) Describing Advanced Data Center Security Cisco TrustSec in Cisco Secure Enclaves Architecture Cisco TrustSec Operation Firewalling Positioning the Firewall Within Data Center Networks Cisco Firepower© Portfolio Firewall Virtualization Design for Threat Mitigation Describing Management and Orchestration Network and License Management Cisco UCS Manager Cisco UCS Director Cisco Intersight Cisco DCNM Overview Describing Storage and RAID Options Position DAS in Storage Technologies Network-Attached Storage Fibre Channel, FCoE, and Internet Small Computer System Interface (iSCSI) Evaluate Storage Technologies Describing Fibre Channel Concepts Fibre Channel Connections, Layers, and Addresses Fibre Channel Communication Virtualization in Fibre Channel SAN Describing Fibre Channel Topologies SAN Parameterization SAN Design Options Choosing a Fibre Channel Design Solution Describing FCoE FCoE Protocol Characteristics FCoE Communication Data Center Bridging FCoE Initialization Protocol FCoE Design Options Describing Storage Security Common SAN Security Features Zones SAN Security Enhancements Cryptography in SAN Describing SAN Management and Orchestration Cisco DCNM for SAN Cisco DCNM Analytics and Streaming Telemetry Cisco UCS Director in the SAN Cisco UCS Director Workflows Describing Cisco UCS Servers and Use Cases Cisco UCS C-Series Servers Fabric Interconnects and Blade Chassis Cisco UCS B-Series Server Adapter Cards Stateless Computing Cisco UCS Mini Describing Fabric Interconnect Connectivity Use of Fabric Interconnect Interfaces VLANs and VSANs in a Cisco UCS Domain Southbound Connections Northbound Connections Disjoint Layer 2 Networks Fabric Interconnect High Availability and Redundancy Describing Hyperconverged and Integrated Systems Hyperconverged and Integrated Systems Overview Cisco HyperFlex? Solution Cisco HyperFlex Scalability and Robustness Cisco HyperFlex Clusters Cluster Capacity and Multiple Clusters on One Cisco UCS Domain External Storage and Graphical Processing Units on Cisco HyperFlex Cisco HyperFlex Positioning Describing Cisco UCS Manager Systemwide Parameters Cisco UCS Setup and Management Cisco UCS Traffic Management Describing Cisco UCS RBAC Roles and Privileges Organizations in Cisco UCS Manager Locales and Effective Rights Authentication, Authorization, and Accounting Two-Factor Authentication Describing Pools for Service Profiles Global and Local Pools Universally Unique Identifier (UUID) Suffix and Media Access Control (MAC) Address Pools World Wide Name (WWN) Pools Server and iSCSI Initiator IP Pools Describing Policies for Service Profiles Global vs. Local Policies Storage and Basic Input/Output System (BIOS) Policies Boot and Scrub Policies Intelligent Platform Management Interface (IPMI) and Maintenance Policies Describing Network-Specific Adapters and Policies LAN Connectivity Controls SAN Connectivity Controls Virtual Access Layer Connectivity Enhancements Describing Templates in Cisco UCS Manager Cisco UCS Templates Service Profile Templates Network Templates Designing Data Center Automation Model-Driven Programmability Cisco NX-API Overview Programmability Using Python Cisco Ansible Module Use the Puppet Agent Additional course details: Nexus Humans Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Designing Cisco Data Center Infrastructure v7.0 (DCID)
Delivered OnlineFlexible Dates
Price on Enquiry

EXIN Blockchain Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Die Zertifizierung richtet sich an Fachexperten für Geschäftsprozesse aller Branchen und IT-Experten, die die Blockchain beruflich als kryptographische Lösung oder als Smart Contract (Computerprotokoll zur Abwicklung von Verträgen) einsetzen oder einsetzen wollen. Overview Mit einem EXIN Blockchain Foundation-Zertifikat weisen Sie professionelle Kenntnisse in den folgenden Bereichen nach: Grundlagen der Blockchain-Technologie Blockchain-Herausforderungen Blockchain-Anwendungen Blockchain-Innovationen EXIN Blockchain Foundation ist eine Zertifizierung auf Basisniveau. Mit dem EXIN Blockchain Foundation-Zertifikat wird professionelle Kenntnisse nachgewiesen ber Blockchain als Transaktionsverzeichnis analog einem Hauptbuch (Ledger), wie das potenziell als weltweites, dezentralisiertes Register zur Aufzeichnung, Bestandsaufnahme und šbertragung von materiellen Werten, wie z. B. Finanzmitteln, Immobilien, Produkten, aber auch immateriellen Werten, wie Wahlstimmen, Software, Gesundheitsdaten und Ideen genutzt werden kann. Die Zertifizierung deckt die Grundbegriffe der Blockchain-Technologie, m'gliche Anwendungsbereiche, den potenziellen Wert fr die Organisation und die der Blockchain zugrundeliegende Technologie ab. Grundalgen der Blockchain Die Blockchain-Technologie Zus„tzliche Blockchain-Elemente Aufbau eines Blockchain-Netzwerks Blockchain-Herausforderungen Die Herausforderungen bei einer Blockchain Begrenzung des Blockchain-Risikos Blockchain-Anwendungen Anwendugsf„lle fr Blockchains Blockchain-Technologie fr Unternehmenswanwendungen Blockchain-Technologie fr gesellschaftliche Anwendungen Erweiterung von Blockchain-Anwendungen Blockchain und globale Wirtschaft Blockchain-Innovationen Innovationen in der Blockchain-Technologie Additional course details: Nexus Humans EXIN Blockchain Foundation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EXIN Blockchain Foundation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EXIN Blockchain Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Service Provider Advanced Routing Solutions v1.0 (SPRI)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for professionals who need knowledge about implementing various Service Provider core technologies and advanced routing technologies. Network administrators System engineers Project managers Network designers Overview After taking this course, you should be able to: Describe the main characteristics of routing protocols that are used in Service provider environments Implement advanced features of multiarea Open Shortest Path First (OSPFv2) running in Service Provider networks Implement advanced features of multilevel Intermediate System to Intermediate System (ISIS) running in Service Provider networks Configure route redistribution Configure Border Gateway Protocol (BGP) in order to successfully connect the Service Provider network to the customer or upstream Service Provider Configure BGP scalability in Service Provider networks Implement BGP security options Implement advanced features in order to improve convergence in BGP networks Troubleshoot OSPF, ISIS, and BGP Implement and verify MPLS Implement and troubleshoot MPLS traffic engineering Implement and verify segment routing technology within an interior gateway protocol Describe how traffic engineering is used in segment routing networks Implement IPv6 tunneling mechanisms Describe and compare core multicast concepts Implement and verifying the PIM-SM protocol Implement enhanced Protocol-Independent Multicast - Sparse Mode (PIM-SM) features Implement Multicast Source Discovery Protocol (MSDP) in the interdomain environment Implement mechanisms for dynamic Rendezvous Point (RP) distribution The Implementing Cisco Service Provider Advanced Routing Solutions (SPRI) 5-day course teaches you theories and practices to integrate advanced routing technologies including routing protocols, multicast routing, policy language, Multiprotocol Label Switching (MPLS), and segment routing, expanding your knowledge and skills in service provider core networks. This course prepares you for the 300-510 Implementing Cisco© Service Provider Advanced Routing Solutions (SPRI) exam. The course qualifies for 40 Cisco Continuing Education credits (CE) towards recertification. This course will help you: Gain the high-demand skills to maintain and operate advanced technologies related to Service Provider core networks Increase your knowledge and skills for implementing Service Provider core advanced technologies though hands-on application and practical instruction Prepare to take the 300-510 SPRI exam Course Outline Implementing and Verifying Open Shortest Path First Multiarea Networks Implementing and Verifying Intermediate System to Intermediate System Multilevel Networks Introducing Routing Protocol Tools, Route Maps, and Routing Policy Language Implementing Route Redistribution Influencing Border Gateway Protocol Route Selection Scaling BGP in Service Provider Networks Securing BGP in Service Provider Networks Improving BGP Convergence and Implementing Advanced Operations Troubleshooting Routing Protocols Implementing and Verifying MPLS Implementing Cisco MPLS Traffic Engineering Implementing Segment Routing Describing Segment Routing Traffic Engineering (SR TE) Deploying IPv6 Tunneling Mechanisms Implementing IP Multicast Concepts and Technologies Implementing PIM-SM Protocol Implementing PIM-SM Enhancements Implementing Interdomain IP Multicast Implementing Distributed Rendezvous Point Solution in Multicast Network

Cisco Implementing Cisco Service Provider Advanced Routing Solutions v1.0 (SPRI)
Delivered OnlineFlexible Dates
Price on Enquiry